audit: type=1800 audit(1621042939.750:322): pid=5568 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=163842 res=0 audit: type=1800 audit(1621042939.750:323): pid=5568 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed" comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=196610 res=0 INFO: trying to register non-static key. audit: type=1804 audit(1621042939.920:324): pid=5598 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="bus" dev="sda1" ino=14489 res=1 the code is fine but needs lockdep annotation. turning off the locking correctness validator. CPU: 0 PID: 5606 Comm: syz-executor.4 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 register_lock_class+0x32b/0x1320 kernel/locking/lockdep.c:768 __lock_acquire+0x167/0x3f20 kernel/locking/lockdep.c:3378 lock_acquire+0x170/0x3f0 kernel/locking/lockdep.c:3998 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline] _raw_spin_lock_irqsave+0x8c/0xc0 kernel/locking/spinlock.c:160 skb_dequeue+0x1c/0x180 net/core/skbuff.c:2831 skb_queue_purge+0x21/0x30 net/core/skbuff.c:2869 l2cap_chan_del+0x56d/0x950 net/bluetooth/l2cap_core.c:637 l2cap_chan_close+0x103/0x870 net/bluetooth/l2cap_core.c:757 l2cap_sock_shutdown+0x2e7/0xc20 net/bluetooth/l2cap_sock.c:1160 l2cap_sock_release+0x77/0x280 net/bluetooth/l2cap_sock.c:1203 __sock_release+0xcd/0x2b0 net/socket.c:602 sock_close+0x15/0x20 net/socket.c:1139 __fput+0x25f/0x7a0 fs/file_table.c:210 task_work_run+0x11f/0x190 kernel/task_work.c:113 get_signal+0x18a3/0x1ca0 kernel/signal.c:2234 do_signal+0x7c/0x1550 arch/x86/kernel/signal.c:792 exit_to_usermode_loop+0x160/0x200 arch/x86/entry/common.c:160 prepare_exit_to_usermode arch/x86/entry/common.c:199 [inline] syscall_return_slowpath arch/x86/entry/common.c:270 [inline] do_syscall_64+0x4a3/0x640 arch/x86/entry/common.c:297 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007fdbfa9d7188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: fffffffffffffffc RBX: 000000000056c200 RCX: 00000000004665d9 RDX: 000000000000000e RSI: 0000000020000000 RDI: 0000000000000006 RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c200 R13: 00007ffe199093cf R14: 00007fdbfa9d7300 R15: 0000000000022000 overlayfs: unrecognized mount option "’ÊkU”PRÓ!<‡n[H’.yµhÕ'Ã1æ;’x" or missing value tmpfs: No value for mount option 'ýÿ' overlayfs: unrecognized mount option "’ÊkU”PRÓ!<‡n[H’.yµhÕ'Ã1æ;’x" or missing value overlayfs: filesystem on './bus' not supported as upperdir tmpfs: No value for mount option 'ýÿ' kauditd_printk_skb: 5 callbacks suppressed audit: type=1804 audit(1621042943.520:330): pid=5694 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="file0" dev="sda1" ino=14129 res=1 audit: type=1804 audit(1621042943.720:331): pid=5741 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/455/memory.events" dev="sda1" ino=14193 res=1 audit: type=1800 audit(1621042943.720:332): pid=5741 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14193 res=0 IPVS: ftp: loaded support on port[0] = 21 IPVS: ftp: loaded support on port[0] = 21 audit: type=1804 audit(1621042944.850:333): pid=5834 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/456/memory.events" dev="sda1" ino=14241 res=1 audit: type=1800 audit(1621042944.880:334): pid=5834 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14241 res=0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 5824 Comm: syz-executor.1 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] alloc_pipe_info+0xaa/0x3c0 fs/pipe.c:647 splice_direct_to_actor+0x580/0x730 fs/splice.c:920 do_splice_direct+0x164/0x210 fs/splice.c:1061 do_sendfile+0x47f/0xb30 fs/read_write.c:1441 SYSC_sendfile64 fs/read_write.c:1502 [inline] SyS_sendfile64+0xff/0x110 fs/read_write.c:1488 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f5b8351c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665d9 RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 RBP: 00007f5b8351c1d0 R08: 0000000000000000 R09: 0000000000000000 R10: 00000ffffffff880 R11: 0000000000000246 R12: 0000000000000001 R13: 00007ffd48a2c35f R14: 00007f5b8351c300 R15: 0000000000022000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5905 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] __do_kmalloc mm/slab.c:3718 [inline] __kmalloc+0x2c1/0x400 mm/slab.c:3729 kmalloc include/linux/slab.h:493 [inline] SYSC_memfd_create mm/shmem.c:3738 [inline] SyS_memfd_create+0xbc/0x3c0 mm/shmem.c:3708 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f0985451f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00000000004665d9 RDX: 00007f0985452000 RSI: 0000000000000000 RDI: 00000000004bee66 RBP: 0000000000000000 R08: 00007f0985451ff8 R09: ffffffffffffffff R10: 00007f0985451ffc R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 audit: type=1804 audit(1621042946.460:335): pid=5880 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/457/memory.events" dev="sda1" ino=14507 res=1 audit: type=1800 audit(1621042946.500:336): pid=5880 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14507 res=0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5920 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 __d_alloc+0x2a/0xa20 fs/dcache.c:1623 __shmem_file_setup.part.0+0xcb/0x3c0 mm/shmem.c:4260 __shmem_file_setup mm/shmem.c:4248 [inline] shmem_file_setup mm/shmem.c:4315 [inline] SYSC_memfd_create mm/shmem.c:3768 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3708 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f0985451f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00000000004665d9 RDX: 00007f0985452000 RSI: 0000000000000000 RDI: 00000000004bee66 RBP: 0000000000000000 R08: 00007f0985451ff8 R09: ffffffffffffffff R10: 00007f0985451ffc R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5945 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 shmem_alloc_inode+0x18/0x40 mm/shmem.c:3888 alloc_inode+0x5d/0x170 fs/inode.c:210 new_inode_pseudo fs/inode.c:899 [inline] new_inode+0x1d/0xf0 fs/inode.c:928 shmem_get_inode+0x8b/0x890 mm/shmem.c:2176 __shmem_file_setup.part.0+0x104/0x3c0 mm/shmem.c:4266 __shmem_file_setup mm/shmem.c:4248 [inline] shmem_file_setup mm/shmem.c:4315 [inline] SYSC_memfd_create mm/shmem.c:3768 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3708 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f0985451f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00000000004665d9 RDX: 00007f0985452000 RSI: 0000000000000000 RDI: 00000000004bee66 RBP: 0000000000000000 R08: 00007f0985451ff8 R09: ffffffffffffffff R10: 00007f0985451ffc R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 5963 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x86/0x3e0 fs/file_table.c:123 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4278 __shmem_file_setup mm/shmem.c:4248 [inline] shmem_file_setup mm/shmem.c:4315 [inline] SYSC_memfd_create mm/shmem.c:3768 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3708 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f0985451f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00000000004665d9 RDX: 00007f0985452000 RSI: 0000000000000000 RDI: 00000000004bee66 RBP: 0000000000000000 R08: 00007f0985451ff8 R09: ffffffffffffffff R10: 00007f0985451ffc R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 audit: type=1804 audit(1621042948.720:337): pid=5957 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/458/memory.events" dev="sda1" ino=14526 res=1 audit: type=1800 audit(1621042948.750:338): pid=5957 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14526 res=0 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 audit: type=1804 audit(1621042948.810:339): pid=5955 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/458/memory.events" dev="sda1" ino=14526 res=1 CPU: 0 PID: 5976 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 audit: type=1800 audit(1621042948.850:340): pid=5955 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14526 res=0 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x15c/0x3e0 fs/file_table.c:129 alloc_file+0x23/0x440 fs/file_table.c:164 __shmem_file_setup.part.0+0x198/0x3c0 mm/shmem.c:4278 __shmem_file_setup mm/shmem.c:4248 [inline] shmem_file_setup mm/shmem.c:4315 [inline] SYSC_memfd_create mm/shmem.c:3768 [inline] SyS_memfd_create+0x1fc/0x3c0 mm/shmem.c:3708 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4665d9 RSP: 002b:00007f0985451f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 00000000004665d9 RDX: 00007f0985452000 RSI: 0000000000000000 RDI: 00000000004bee66 RBP: 0000000000000000 R08: 00007f0985451ff8 R09: ffffffffffffffff R10: 00007f0985451ffc R11: 0000000000000246 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 audit: type=1804 audit(1621042949.130:341): pid=5990 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/459/memory.events" dev="sda1" ino=14525 res=1 CPU: 0 PID: 5995 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 audit: type=1800 audit(1621042949.150:342): pid=5990 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14525 res=0 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 do_sys_open+0x1ce/0x410 fs/open.c:1075 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4196c4 RSP: 002b:00007f0985451ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 RDX: 0000000000000002 RSI: 00007f0985452000 RDI: 00000000ffffff9c RBP: 00007f0985452000 R08: 0000000000000000 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 R13: 0000000000000005 R14: 0000000020000400 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name fail_page_alloc, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6000 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_fail_alloc_page mm/page_alloc.c:2898 [inline] prepare_alloc_pages mm/page_alloc.c:4131 [inline] __alloc_pages_nodemask+0x22c/0x2720 mm/page_alloc.c:4179 __alloc_pages include/linux/gfp.h:484 [inline] __alloc_pages_node include/linux/gfp.h:497 [inline] kmem_getpages mm/slab.c:1419 [inline] cache_grow_begin+0x91/0x700 mm/slab.c:2676 cache_alloc_refill+0x273/0x350 mm/slab.c:3043 ____cache_alloc mm/slab.c:3125 [inline] __do_cache_alloc mm/slab.c:3347 [inline] slab_alloc mm/slab.c:3382 [inline] kmem_cache_alloc+0x333/0x3c0 mm/slab.c:3550 getname_flags+0xc8/0x550 fs/namei.c:138 do_sys_open+0x1ce/0x410 fs/open.c:1075 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4196c4 RSP: 002b:00007f0985451ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 RDX: 0000000000000002 RSI: 00007f0985452000 RDI: 00000000ffffff9c RBP: 00007f0985452000 R08: 0000000000000000 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 R13: 0000000000000005 R14: 0000000020000400 R15: 0000000000000000 audit: type=1800 audit(1621042949.580:343): pid=5990 uid=0 auid=4294967295 ses=4294967295 op="collect_data" cause="failed(directio)" comm="syz-executor.1" name="memory.events" dev="sda1" ino=14525 res=0 audit: type=1804 audit(1621042949.620:344): pid=5985 uid=0 auid=4294967295 ses=4294967295 op="invalid_pcr" cause="ToMToU" comm="syz-executor.1" name="/root/syzkaller-testdir544400138/syzkaller.fWvNMz/459/memory.events" dev="sda1" ino=14525 res=1 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6015 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: Bluetooth: received HCILL_WAKE_UP_IND in state 2 __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc+0x28e/0x3c0 mm/slab.c:3550 kmem_cache_zalloc include/linux/slab.h:651 [inline] get_empty_filp+0x86/0x3e0 fs/file_table.c:123 path_openat+0x84/0x2970 fs/namei.c:3545 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4196c4 RSP: 002b:00007f0985451ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 RDX: 0000000000000002 RSI: 00007f0985452000 RDI: 00000000ffffff9c RBP: 00007f0985452000 R08: 0000000000000000 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 R13: 0000000000000005 R14: 0000000020000400 R15: 0000000000000000 Bluetooth: Unknown HCI packet type 5e Bluetooth: Unknown HCI packet type 43 Bluetooth: Unknown HCI packet type 5e Bluetooth: Unknown HCI packet type 50 Bluetooth: Unknown HCI packet type 5e Bluetooth: Unknown HCI packet type 40 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 0 PID: 6037 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58 fail_dump lib/fault-inject.c:51 [inline] should_fail.cold+0x10a/0x149 lib/fault-inject.c:149 should_failslab+0xd6/0x130 mm/failslab.c:32 slab_pre_alloc_hook mm/slab.h:421 [inline] slab_alloc mm/slab.c:3376 [inline] kmem_cache_alloc_trace+0x29a/0x3d0 mm/slab.c:3616 kmalloc include/linux/slab.h:488 [inline] kzalloc include/linux/slab.h:661 [inline] aa_alloc_file_ctx security/apparmor/include/file.h:60 [inline] apparmor_file_alloc_security+0x129/0x800 security/apparmor/lsm.c:431 security_file_alloc+0x66/0xa0 security/security.c:874 get_empty_filp+0x15c/0x3e0 fs/file_table.c:129 path_openat+0x84/0x2970 fs/namei.c:3545 do_filp_open+0x179/0x3c0 fs/namei.c:3603 do_sys_open+0x296/0x410 fs/open.c:1081 do_syscall_64+0x1d5/0x640 arch/x86/entry/common.c:292 entry_SYSCALL_64_after_hwframe+0x46/0xbb RIP: 0033:0x4196c4 RSP: 002b:00007f0985451ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196c4 RDX: 0000000000000002 RSI: 00007f0985452000 RDI: 00000000ffffff9c RBP: 00007f0985452000 R08: 0000000000000000 R09: ffffffffffffffff R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 R13: 0000000000000005 R14: 0000000020000400 R15: 0000000000000000 FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 0 CPU: 1 PID: 6043 Comm: syz-executor.5 Not tainted 4.14.232-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:17 [inline] dump_stack+0x1b2/0x281 lib/dump_stack.c:58